• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 32
Next 10 →

An exponential number of generalized Kerdock codes

by William M. Kantor - Inform. Control , 1982
"... If n- 1 is an odd composite integer then there are at least 2 tl/2)~f ~ pairwise inequivalent binary error-correcting codes of length 2 n, size 22n, and minimum distance 2 n 1-2(1/2)n 1. 1. ..."
Abstract - Cited by 10 (6 self) - Add to MetaCart
If n- 1 is an odd composite integer then there are at least 2 tl/2)~f ~ pairwise inequivalent binary error-correcting codes of length 2 n, size 22n, and minimum distance 2 n 1-2(1/2)n 1. 1.

North-Holland Kerdock codes and related planes

by William M. Kantor, W. M. Kantor , 1992
"... Among the many aspects of coding theory Jack van Lint has studied intensively are some generalizations of Preparata and Kerdock codes (see Baker et al. (1983), Cameron and Van Lint (1991) and Van Lint (1983)). There are still many open problems concerning these. This note is a brief discussion of pr ..."
Abstract - Add to MetaCart
Among the many aspects of coding theory Jack van Lint has studied intensively are some generalizations of Preparata and Kerdock codes (see Baker et al. (1983), Cameron and Van Lint (1991) and Van Lint (1983)). There are still many open problems concerning these. This note is a brief discussion

Quaternionic line-sets and quaternionic Kerdock codes

by William M. Kantor - LINEAL ALGEBRA AND ITS APPPLICATIONS , 1995
"... When n is even, orthogonal spreads in an orthogonal vector space of type O−(2n−2,2) are used to construct line-sets of size (2n−1+1)2n−2 in H2n−2 all of whose angles are 90° or cos−1(2−(n−2)/2). These line-sets are then used to obtain quaternionic Kerdock codes. These constructions are based on idea ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
When n is even, orthogonal spreads in an orthogonal vector space of type O−(2n−2,2) are used to construct line-sets of size (2n−1+1)2n−2 in H2n−2 all of whose angles are 90° or cos−1(2−(n−2)/2). These line-sets are then used to obtain quaternionic Kerdock codes. These constructions are based

Kerdock Codes for Limited Feedback Precoded MIMO Systems

by Takao Inoue, Robert W. Heath, Jr. , 2008
"... A codebook based limited feedback strategy is a practical way to obtain partial channel state information at the transmitter in a precoded multiple-input multiple-output (MIMO) wireless system. Conventional codebook designs use Grassmannian packing, equiangular frames, vector quantization, or Fourie ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
codebooks may not have a systematic structure to facilitate storage of the codebook and low search complexity. In this paper, we propose a new systematic codebook design based on Kerdock codes and mutually unbiased bases. The proposed Kerdock codebook consists of multiple mutually unbiased unitary bases

Intersections of Golay codes with higher order Kerdock codes

by Mohammed Abouzaid, Nick Gurski , 1999
"... Golay codewords are useful for transmission schemes such as OFDM, and [MacWilliams/Sloane] demonstrated that these codewords are bent functions contained in second order Reed-Muller codes. This paper investigates the intersection between these codes and Kerdock-like codes. 1 1 Introduction 1.1 Pur ..."
Abstract - Add to MetaCart
Golay codewords are useful for transmission schemes such as OFDM, and [MacWilliams/Sloane] demonstrated that these codewords are bent functions contained in second order Reed-Muller codes. This paper investigates the intersection between these codes and Kerdock-like codes. 1 1 Introduction 1

Kerdock codes and extremal Euclidean line-sets

by Kanat Abdukhalikov, Eiichi Bannai, Sho Suda , 802
"... Association schemes related to universally optimal configurations, ..."
Abstract - Add to MetaCart
Association schemes related to universally optimal configurations,

Z4-KERDOCK CODES, ORTHOGONAL SPREADS, AND EXTREMAL EUCLIDEAN LINE-SETS

by A. R. Calderbank, et al. , 1997
"... ..."
Abstract - Cited by 84 (11 self) - Add to MetaCart
Abstract not found

DISTRIBUTION OF R-PATTERNS IN THE KERDOCK-CODE BINARY SEQUENCES AND THE HIGHEST LEVEL SEQUENCES OF PRIMITIVE SEQUENCES OVER Z 2 l

by Honggang Hu Dengguo Feng
"... Abstract. The distribution of r-patterns is an important aspect of pseudorandomness for periodic sequences over finite field.The aim of this work is to study the distribution of r-patterns in the Kerdock-code binary sequences and the highest level sequences of primitive sequences over Z 2 l.By combi ..."
Abstract - Add to MetaCart
Abstract. The distribution of r-patterns is an important aspect of pseudorandomness for periodic sequences over finite field.The aim of this work is to study the distribution of r-patterns in the Kerdock-code binary sequences and the highest level sequences of primitive sequences over Z 2 l

Distribution Of R-Patterns In The Kerdock-Code Binary Sequences And The Highest Level Sequences Of Primitive Sequences Over...

by Honggang Hu, Dengguo Feng, Honggang Hu Dengguo Feng , 2004
"... The distribution of r-patterns is an important aspect of pseudorandomness for periodic sequences over finite field.The aim of this work is to study the distribution of r-patterns in the Kerdock-code binary sequences and the highest level sequences of primitive sequences over Z 2 l .By combining the ..."
Abstract - Add to MetaCart
The distribution of r-patterns is an important aspect of pseudorandomness for periodic sequences over finite field.The aim of this work is to study the distribution of r-patterns in the Kerdock-code binary sequences and the highest level sequences of primitive sequences over Z 2 l .By combining

3 ACCURATE DETECTION OF MOVING TARGETS VIA RANDOM SENSOR ARRAYS AND KERDOCK CODES

by Thomas Strohmer, Haichao Wang
"... iv ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 32
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University